You are currently browsing the category archive for the ‘teaching’ category.

We will shortly turn to the complex-analytic approach to multiplicative number theory, which relies on the basic properties of complex analytic functions. In this supplement to the main notes, we quickly review the portions of complex analysis that we will be using in this course. We will not attempt a comprehensive review of this subject; for instance, we will completely neglect the conformal geometry or Riemann surface aspect of complex analysis, and we will also avoid using the various boundary convergence theorems for Taylor series or Dirichlet series (the latter type of result is traditionally utilised in multiplicative number theory, but I personally find them a little unintuitive to use, and will instead rely on a slightly different set of complex-analytic tools). We will also focus on the “local” structure of complex analytic functions, in particular adopting the philosophy that such functions behave locally like complex polynomials; the classical “global” theory of entire functions, while traditionally used in the theory of the Riemann zeta function, will be downplayed in these notes. On the other hand, we will play up the relationship between complex analysis and Fourier analysis, as we will incline to using the latter tool over the former in some of the subsequent material. (In the traditional approach to the subject, the Mellin transform is used in place of the Fourier transform, but we will not emphasise the role of the Mellin transform here.)

We begin by recalling the notion of a holomorphic function, which will later be shown to be essentially synonymous with that of a complex analytic function.

Definition 1 (Holomorphic function)Let be an open subset of , and let be a function. If , we say that iscomplex differentiableat if the limitexists, in which case we refer to as the (complex)

derivativeof at . If is differentiable at every point of , and the derivative is continuous, we say that isholomorphicon .

Exercise 2Show that a function is holomorphic if and only if the two-variable function is continuously differentiable on and obeys the Cauchy-Riemann equation

Basic examples of holomorphic functions include complex polynomials

as well as the complex exponential function

which are holomorphic on the entire complex plane (i.e., they are entire functions). The sum or product of two holomorphic functions is again holomorphic; the quotient of two holomorphic functions is holomorphic so long as the denominator is non-zero. Finally, the composition of two holomorphic functions is holomorphic wherever the composition is defined.

- (i) Establish Euler’s formula
for all . (

Hint:it is a bit tricky to do this starting from the trigonometric definitions of sine and cosine; I recommend either using the Taylor series formulations of these functions instead, or alternatively relying on the ordinary differential equations obeyed by sine and cosine.)- (ii) Show that every non-zero complex number has a complex logarithm such that , and that this logarithm is unique up to integer multiples of .
- (iii) Show that there exists a unique principal branch of the complex logarithm in the region , defined by requiring to be a logarithm of with imaginary part between and . Show that this principal branch is holomorphic with derivative .

In real analysis, we have the fundamental theorem of calculus, which asserts that

whenever is a real interval and is a continuously differentiable function. The complex analogue of this fact is that

whenever is a holomorphic function, and is a contour in , by which we mean a piecewise continuously differentiable function, and the contour integral for a continuous function is defined via change of variables as

The complex fundamental theorem of calculus (2) follows easily from the real fundamental theorem and the chain rule.

In real analysis, we have the rather trivial fact that the integral of a continuous function on a closed contour is always zero:

In complex analysis, the analogous fact is significantly more powerful, and is known as Cauchy’s theorem:

Theorem 4 (Cauchy’s theorem)Let be a holomorphic function in a simply connected open set , and let be a closed contour in (thus ). Then .

Exercise 5Use Stokes’ theorem to give a proof of Cauchy’s theorem.

A useful reformulation of Cauchy’s theorem is that of contour shifting: if is a holomorphic function on a open set , and are two contours in an open set with and , such that can be continuously deformed into , then . A basic application of contour shifting is the Cauchy integral formula:

Theorem 6 (Cauchy integral formula)Let be a holomorphic function in a simply connected open set , and let be a closed contour which is simple (thus does not traverse any point more than once, with the exception of the endpoint that is traversed twice), and which encloses a bounded region in the anticlockwise direction. Then for any , one has

*Proof:* Let be a sufficiently small quantity. By contour shifting, one can replace the contour by the sum (concatenation) of three contours: a contour from to , a contour traversing the circle once anticlockwise, and the reversal of the contour that goes from to . The contributions of the contours cancel each other, thus

By a change of variables, the right-hand side can be expanded as

Sending , we obtain the claim.

The Cauchy integral formula has many consequences. Specialising to the case when traverses a circle around , we conclude the mean value property

whenever is holomorphic in a neighbourhood of the disk . In a similar spirit, we have the maximum principle for holomorphic functions:

Lemma 7 (Maximum principle)Let be a simply connected open set, and let be a simple closed contour in enclosing a bounded region anti-clockwise. Let be a holomorphic function. If we have the bound for all on the contour , then we also have the bound for all .

*Proof:* We use an argument of Landau. Fix . From the Cauchy integral formula and the triangle inequality we have the bound

for some constant depending on and . This ostensibly looks like a weaker bound than what we want, but we can miraculously make the constant disappear by the “tensor power trick“. Namely, observe that if is a holomorphic function bounded in magnitude by on , and is a natural number, then is a holomorphic function bounded in magnitude by on . Applying the preceding argument with replaced by we conclude that

and hence

Sending , we obtain the claim.

Another basic application of the integral formula is

Corollary 8Every holomorphic function is complex analytic, thus it has a convergent Taylor series around every point in the domain. In particular, holomorphic functions are smooth, and the derivative of a holomorphic function is again holomorphic.

Conversely, it is easy to see that complex analytic functions are holomorphic. Thus, the terms “complex analytic” and “holomorphic” are synonymous, at least when working on open domains. (On a non-open set , saying that is analytic on is equivalent to asserting that extends to a holomorphic function of an open neighbourhood of .) This is in marked contrast to real analysis, in which a function can be continuously differentiable, or even smooth, without being real analytic.

*Proof:* By translation, we may suppose that . Let be a a contour traversing the circle that is contained in the domain , then by the Cauchy integral formula one has

for all in the disk . As is continuously differentiable (and hence continuous) on , it is bounded. From the geometric series formula

and dominated convergence, we conclude that

with the right-hand side an absolutely convergent series for , and the claim follows.

Exercise 9Establish the generalised Cauchy integral formulaefor any non-negative integer , where is the -fold complex derivative of .

This in turn leads to a converse to Cauchy’s theorem, known as Morera’s theorem:

Corollary 10 (Morera’s theorem)Let be a continuous function on an open set with the property that for all closed contours . Then is holomorphic.

*Proof:* We can of course assume to be non-empty and connected (hence path-connected). Fix a point , and define a “primitive” of by defining , with being any contour from to (this is well defined by hypothesis). By mimicking the proof of the real fundamental theorem of calculus, we see that is holomorphic with , and the claim now follows from Corollary 8.

An important consequence of Morera’s theorem for us is

Corollary 11 (Locally uniform limit of holomorphic functions is holomorphic)Let be holomorphic functions on an open set which converge locally uniformly to a function . Then is also holomorphic on .

*Proof:* By working locally we may assume that is a ball, and in particular simply connected. By Cauchy’s theorem, for all closed contours in . By local uniform convergence, this implies that for all such contours, and the claim then follows from Morera’s theorem.

Now we study the zeroes of complex analytic functions. If a complex analytic function vanishes at a point , but is not identically zero in a neighbourhood of that point, then by Taylor expansion we see that factors in a sufficiently small neighbourhood of as

for some natural number (which we call the *order* or *multiplicity* of the zero at ) and some function that is complex analytic and non-zero near ; this generalises the factor theorem for polynomials. In particular, the zero is isolated if does not vanish identically near . We conclude that if is connected and vanishes on a neighbourhood of some point in , then it must vanish on all of (since the maximal connected neighbourhood of in on which vanishes cannot have any boundary point in ). This implies unique continuation of analytic functions: if two complex analytic functions on agree on a non-empty open set, then they agree everywhere. In particular, if a complex analytic function does not vanish everywhere, then all of its zeroes are isolated, so in particular it has only finitely many zeroes on any given compact set.

Recall that a rational function is a function which is a quotient of two polynomials (at least outside of the set where vanishes). Analogously, let us define a meromorphic function on an open set to be a function defined outside of a discrete subset of (the *singularities* of ), which is locally the quotient of holomorphic functions, in the sense that for every , one has in a neighbourhood of excluding , with holomorphic near and with non-vanishing outside of . If and has a zero of equal or higher order than at , then the singularity is removable and one can extend the meromorphic function holomorphically across (by the holomorphic factor theorem (4)); otherwise, the singularity is non-removable and is known as a *pole*, whose order is equal to the difference between the order of and the order of at . (If one wished, one could extend meromorphic functions to the poles by embedding in the Riemann sphere and mapping each pole to , but we will not do so here. One could also consider non-meromorphic functions with essential singularities at various points, but we will have no need to analyse such singularities in this course.) If the order of a pole or zero is one, we say that it is *simple*; if it is two, we say it is *double*; and so forth.

Exercise 12Show that the space of meromorphic functions on a non-empty open set , quotiented by almost everywhere equivalence, forms a field.

By quotienting two Taylor series, we see that if a meromorphic function has a pole of order at some point , then it has a Laurent expansion

absolutely convergent in a neighbourhood of excluding itself, and with non-zero. The Laurent coefficient has a special significance, and is called the residue of the meromorphic function at , which we will denote as . The importance of this coefficient comes from the following significant generalisation of the Cauchy integral formula, known as the residue theorem:

Exercise 13 (Residue theorem)Let be a meromorphic function on a simply connected domain , and let be a closed contour in enclosing a bounded region anticlockwise, and avoiding all the singularities of . Show thatwhere is summed over all the poles of that lie in .

The residue theorem is particularly useful when applied to logarithmic derivatives of meromorphic functions , because the residue is of a specific form:

Exercise 14Let be a meromorphic function on an open set that does not vanish identically. Show that the only poles of are simple poles (poles of order ), occurring at the poles and zeroes of (after all removable singularities have been removed). Furthermore, the residue of at a pole is an integer, equal to the order of zero of if has a zero at , or equal to negative the order of pole at if has a pole at .

Remark 15The fact that residues of logarithmic derivatives of meromorphic functions are automatically integers is a remarkable feature of the complex analytic approach to multiplicative number theory, which is difficult (though not entirely impossible) to duplicate in other approaches to the subject. Here is a sample application of this integrality, which is challenging to reproduce by non-complex-analytic means: if is meromorphic near , and one has the bound as , then must in fact stay bounded near , because the only integer of magnitude less than is zero.

Analytic number theory is only one of many different approaches to number theory. Another important branch of the subject is algebraic number theory, which studies algebraic structures (e.g. groups, rings, and fields) of number-theoretic interest. With this perspective, the classical field of rationals , and the classical ring of integers , are placed inside the much larger field of algebraic numbers, and the much larger ring of algebraic integers, respectively. Recall that an algebraic number is a root of a polynomial with integer coefficients, and an algebraic integer is a root of a monic polynomial with integer coefficients; thus for instance is an algebraic integer (a root of ), while is merely an algebraic number (a root of ). For the purposes of this post, we will adopt the concrete (but somewhat artificial) perspective of viewing algebraic numbers and integers as lying inside the complex numbers , thus . (From a modern algebraic perspective, it is better to think of as existing as an abstract field separate from , but which has a number of embeddings into (as well as into other fields, such as the completed p-adics ), no one of which should be considered favoured over any other; cf. this mathOverflow post. But for the rudimentary algebraic number theory in this post, we will not need to work at this level of abstraction.) In particular, we identify the algebraic integer with the complex number for any natural number .

Exercise 1Show that the field of algebraic numbers is indeed a field, and that the ring of algebraic integers is indeed a ring, and is in fact an integral domain. Also, show that , that is to say the ordinary integers are precisely the algebraic integers that are also rational. Because of this, we will sometimes refer to elements of asrational integers.

In practice, the field is too big to conveniently work with directly, having infinite dimension (as a vector space) over . Thus, algebraic number theory generally restricts attention to intermediate fields between and , which are of finite dimension over ; that is to say, finite degree extensions of . Such fields are known as algebraic number fields, or *number fields* for short. Apart from itself, the simplest examples of such number fields are the quadratic fields, which have dimension exactly two over .

Exercise 2Show that if is a rational number that is not a perfect square, then the field generated by and either of the square roots of is a quadratic field. Conversely, show that all quadratic fields arise in this fashion. (Hint:show that every element of a quadratic field is a root of a quadratic polynomial over the rationals.)

The ring of algebraic integers is similarly too large to conveniently work with directly, so in algebraic number theory one usually works with the rings of algebraic integers inside a given number field . One can (and does) study this situation in great generality, but for the purposes of this post we shall restrict attention to a simple but illustrative special case, namely the quadratic fields with a certain type of negative discriminant. (The positive discriminant case will be briefly discussed in Remark 42 below.)

Exercise 3Let be a square-free natural number with or . Show that the ring of algebraic integers in is given byIf instead is square-free with , show that the ring is instead given by

What happens if is not square-free, or negative?

Remark 4In the case , it may naively appear more natural to work with the ring , which is an index two subring of . However, because this ring only captures some of the algebraic integers in rather than all of them, the algebraic properties of these rings are somewhat worse than those of (in particular, they generally fail to be Dedekind domains) and so are not convenient to work with in algebraic number theory.

We refer to fields of the form for natural square-free numbers as *quadratic fields of negative discriminant*, and similarly refer to as a ring of quadratic integers of negative discriminant. Quadratic fields and quadratic integers of positive discriminant are just as important to analytic number theory as their negative discriminant counterparts, but we will restrict attention to the latter here for simplicity of discussion.

Thus, for instance, when , the ring of integers in is the ring of Gaussian integers

and when , the ring of integers in is the ring of Eisenstein integers

where is a cube root of unity.

As these examples illustrate, the additive structure of a ring of quadratic integers is that of a two-dimensional lattice in , which is isomorphic as an additive group to . Thus, from an additive viewpoint, one can view quadratic integers as “two-dimensional” analogues of rational integers. From a *multiplicative* viewpoint, however, the quadratic integers (and more generally, integers in a number field) behave very similarly to the rational integers (as opposed to being some sort of “higher-dimensional” version of such integers). Indeed, a large part of basic algebraic number theory is devoted to treating the multiplicative theory of integers in number fields in a unified fashion, that naturally generalises the classical multiplicative theory of the rational integers.

For instance, every rational integer has an absolute value , with the multiplicativity property for , and the positivity property for all . Among other things, the absolute value detects units: if and only if is a unit in (that is to say, it is multiplicatively invertible in ). Similarly, in any ring of quadratic integers with negative discriminant, we can assign a norm to any quadratic integer by the formula

where is the complex conjugate of . (When working with other number fields than quadratic fields of negative discriminant, one instead defines to be the product of all the Galois conjugates of .) Thus for instance, when one has

Analogously to the rational integers, we have the multiplicativity property for and the positivity property for , and the units in are precisely the elements of norm one.

Exercise 5Establish the three claims of the previous paragraph. Conclude that the units (invertible elements) of consist of the four elements if , the six elements if , and the two elements if .

For the rational integers, we of course have the fundamental theorem of arithmetic, which asserts that every non-zero rational integer can be uniquely factored (up to permutation and units) as the product of irreducible integers, that is to say non-zero, non-unit integers that cannot be factored into the product of integers of strictly smaller norm. As it turns out, the same claim is true for a few additional rings of quadratic integers, such as the Gaussian integers and Eisenstein integers, but fails in general; for instance, in the ring , we have the famous counterexample

that decomposes non-uniquely into the product of irreducibles in . Nevertheless, it is an important fact that the fundamental theorem of arithmetic can be salvaged if one uses an “idealised” notion of a number in a ring of integers , now known in modern language as an ideal of that ring. For instance, in , the principal ideal turns out to uniquely factor into the product of (non-principal) ideals ; see Exercise 27. We will review the basic theory of ideals in number fields (focusing primarily on quadratic fields of negative discriminant) below the fold.

The norm forms (1), (2) can be viewed as examples of positive definite quadratic forms over the integers, by which we mean a polynomial of the form

for some integer coefficients . One can declare two quadratic forms to be *equivalent* if one can transform one to the other by an invertible linear transformation , so that . For example, the quadratic forms and are equivalent, as can be seen by using the invertible linear transformation . Such equivalences correspond to the different choices of basis available when expressing a ring such as (or an ideal thereof) additively as a copy of .

There is an important and classical invariant of a quadratic form , namely the discriminant , which will of course be familiar to most readers via the quadratic formula, which among other things tells us that a quadratic form will be positive definite precisely when its discriminant is negative. It is not difficult (particularly if one exploits the multiplicativity of the determinant of matrices) to show that two equivalent quadratic forms have the same discriminant. Thus for instance any quadratic form equivalent to (1) has discriminant , while any quadratic form equivalent to (2) has discriminant . Thus we see that each ring of quadratic integers is associated with a certain negative discriminant , defined to equal when and when .

Exercise 6 (Geometric interpretation of discriminant)Let be a quadratic form of negative discriminant , and extend it to a real form in the obvious fashion. Show that for any , the set is an ellipse of area .

It is natural to ask the converse question: if two quadratic forms have the same discriminant, are they necessarily equivalent? For certain choices of discriminant, this is the case:

Exercise 7Show that any quadratic form of discriminant is equivalent to the form , and any quadratic form of discriminant is equivalent to . (Hint:use elementary transformations to try to make as small as possible, to the point where one only has to check a finite number of cases; this argument is due to Legendre.) More generally, show that for any negative discriminant , there are only finitely many quadratic forms of that discriminant up to equivalence (a result first established by Gauss).

Unfortunately, for most choices of discriminant, the converse question fails; for instance, the quadratic forms and both have discriminant , but are not equivalent (Exercise 38). This particular failure of equivalence turns out to be intimately related to the failure of unique factorisation in the ring .

It turns out that there is a fundamental connection between quadratic fields, equivalence classes of quadratic forms of a given discriminant, and real Dirichlet characters, thus connecting the material discussed above with the last section of the previous set of notes. Here is a typical instance of this connection:

Proposition 8Let be the real non-principal Dirichlet character of modulus , or more explicitly is equal to when , when , and when .

- (i) For any natural number , the number of Gaussian integers with norm is equal to . Equivalently, the number of solutions to the equation with is . (Here, as in the previous post, the symbol denotes Dirichlet convolution.)
- (ii) For any natural number , the number of Gaussian integers that divide (thus for some ) is .

We will prove this proposition later in these notes. We observe that as a special case of part (i) of this proposition, we recover the Fermat two-square theorem: an odd prime is expressible as the sum of two squares if and only if . This proposition should also be compared with the fact, used crucially in the previous post to prove Dirichlet’s theorem, that is non-negative for any , and at least one when is a square, for any quadratic character .

As an illustration of the relevance of such connections to analytic number theory, let us now explicitly compute .

This particular identity is also known as the Leibniz formula.

*Proof:* For a large number , consider the quantity

of all the Gaussian integers of norm less than . On the one hand, this is the same as the number of lattice points of in the disk of radius . Placing a unit square centred at each such lattice point, we obtain a region which differs from the disk by a region contained in an annulus of area . As the area of the disk is , we conclude the Gauss bound

On the other hand, by Proposition 8(i) (and removing the contribution), we see that

Now we use the Dirichlet hyperbola method to expand the right-hand side sum, first expressing

and then using the bounds , , from the previous set of notes to conclude that

Comparing the two formulae for and sending , we obtain the claim.

Exercise 10Give an alternate proof of Corollary 9 that relies on obtaining asymptotics for the Dirichlet series as , rather than using the Dirichlet hyperbola method.

Exercise 11Give a direct proof of Corollary 9 that does not use Proposition 8, instead using Taylor expansion of the complex logarithm . (One can also use Taylor expansions of some other functions related to the complex logarithm here, such as the arctangent function.)

More generally, one can relate for a real Dirichlet character with the number of inequivalent quadratic forms of a certain discriminant, via the famous class number formula; we will give a special case of this formula below the fold.

The material here is only a very rudimentary introduction to algebraic number theory, and is not essential to the rest of the course. A slightly expanded version of the material here, from the perspective of analytic number theory, may be found in Sections 5 and 6 of Davenport’s book. A more in-depth treatment of algebraic number theory may be found in a number of texts, e.g. Fröhlich and Taylor.

In analytic number theory, an arithmetic function is simply a function from the natural numbers to the real or complex numbers. (One occasionally also considers arithmetic functions taking values in more general rings than or , as in this previous blog post, but we will restrict attention here to the classical situation of real or complex arithmetic functions.) Experience has shown that a particularly tractable and relevant class of arithmetic functions for analytic number theory are the multiplicative functions, which are arithmetic functions with the additional property that

whenever are coprime. (One also considers arithmetic functions, such as the logarithm function or the von Mangoldt function, that are not genuinely multiplicative, but interact closely with multiplicative functions, and can be viewed as “derived” versions of multiplicative functions; see this previous post.) A typical example of a multiplicative function is the divisor function

that counts the number of divisors of a natural number . (The divisor function is also denoted in the literature.) The study of asymptotic behaviour of multiplicative functions (and their relatives) is known as multiplicative number theory, and is a basic cornerstone of modern analytic number theory.

There are various approaches to multiplicative number theory, each of which focuses on different asymptotic statistics of arithmetic functions . In *elementary multiplicative number theory*, which is the focus of this set of notes, particular emphasis is given on the following two statistics of a given arithmetic function :

- The
*summatory functions*of an arithmetic function , as well as the associated natural density

(if it exists).

- The
*logarithmic sums*of an arithmetic function , as well as the associated

*logarithmic density*(if it exists).

Here, we are normalising the arithmetic function being studied to be of roughly unit size up to logarithms, obeying bounds such as , , or at worst

A classical case of interest is when is an indicator function of some set of natural numbers, in which case we also refer to the natural or logarithmic density of as the natural or logarithmic density of respectively. However, in analytic number theory it is usually more convenient to replace such indicator functions with other related functions that have better multiplicative properties. For instance, the indicator function of the primes is often replaced with the von Mangoldt function .

Typically, the logarithmic sums are relatively easy to control, but the summatory functions require more effort in order to obtain satisfactory estimates; see Exercise 7 below.

If an arithmetic function is multiplicative (or closely related to a multiplicative function), then there is an important further statistic on an arithmetic function beyond the summatory function and the logarithmic sum, namely the Dirichlet series

for various real or complex numbers . Under the hypothesis (3), this series is absolutely convergent for real numbers , or more generally for complex numbers with . As we will see below the fold, when is multiplicative then the Dirichlet series enjoys an important Euler product factorisation which has many consequences for analytic number theory.

In the elementary approach to multiplicative number theory presented in this set of notes, we consider Dirichlet series only for real numbers (and focusing particularly on the asymptotic behaviour as ); in later notes we will focus instead on the important *complex-analytic* approach to multiplicative number theory, in which the Dirichlet series (4) play a central role, and are defined not only for complex numbers with large real part, but are often extended analytically or meromorphically to the rest of the complex plane as well.

Remark 1The elementary and complex-analytic approaches to multiplicative number theory are the two classical approaches to the subject. One could also consider a more “Fourier-analytic” approach, in which one studies convolution-type statistics such asas for various cutoff functions , such as smooth, compactly supported functions. See for instance this previous blog post for an instance of such an approach. Another related approach is the “pretentious” approach to multiplicative number theory currently being developed by Granville-Soundararajan and their collaborators. We will occasionally make reference to these more modern approaches in these notes, but will primarily focus on the classical approaches.

To reverse the process and derive control on summatory functions or logarithmic sums starting from control of Dirichlet series is trickier, and usually requires one to allow to be complex-valued rather than real-valued if one wants to obtain really accurate estimates; we will return to this point in subsequent notes. However, there is a cheap way to get *upper bounds* on such sums, known as *Rankin’s trick*, which we will discuss later in these notes.

The basic strategy of elementary multiplicative theory is to first gather useful estimates on the statistics of “smooth” or “non-oscillatory” functions, such as the constant function , the harmonic function , or the logarithm function ; one also considers the statistics of periodic functions such as Dirichlet characters. These functions can be understood without any multiplicative number theory, using basic tools from real analysis such as the (quantitative version of the) integral test or summation by parts. Once one understands the statistics of these basic functions, one can then move on to statistics of more arithmetically interesting functions, such as the divisor function (2) or the von Mangoldt function that we will discuss below. A key tool to relate these functions to each other is that of Dirichlet convolution, which is an operation that interacts well with summatory functions, logarithmic sums, and particularly well with Dirichlet series.

This is only an introduction to elementary multiplicative number theory techniques. More in-depth treatments may be found in this text of Montgomery-Vaughan, or this text of Bateman-Diamond.

In the winter quarter (starting January 5) I will be teaching a graduate topics course entitled “An introduction to analytic prime number theory“. As the name suggests, this is a course covering many of the analytic number theory techniques used to study the distribution of the prime numbers . I will list the topics I intend to cover in this course below the fold. As with my previous courses, I will place lecture notes online on my blog in advance of the physical lectures.

The type of results about primes that one aspires to prove here is well captured by Landau’s classical list of problems:

- Even Goldbach conjecture: every even number greater than two is expressible as the sum of two primes.
- Twin prime conjecture: there are infinitely many pairs which are simultaneously prime.
- Legendre’s conjecture: for every natural number , there is a prime between and .
- There are infinitely many primes of the form .

All four of Landau’s problems remain open, but we have convincing heuristic evidence that they are all true, and in each of the four cases we have some highly non-trivial partial results, some of which will be covered in this course. We also now have some understanding of the barriers we are facing to fully resolving each of these problems, such as the parity problem; this will also be discussed in the course.

One of the main reasons that the prime numbers are so difficult to deal with rigorously is that they have very little usable algebraic or geometric structure that we know how to exploit; for instance, we do not have any useful prime generating functions. One of course can create *non-useful* functions of this form, such as the ordered parameterisation that maps each natural number to the prime , or one could invoke Matiyasevich’s theorem to produce a polynomial of many variables whose only positive values are prime, but these sorts of functions have no usable structure to exploit (for instance, they give no insight into any of the Landau problems listed above; see also Remark 2 below). The various primality tests in the literature, while useful for practical applications (e.g. cryptography) involving primes, have also proven to be of little utility for these sorts of problems; again, see Remark 2. In fact, in order to make plausible heuristic predictions about the primes, it is best to take almost the opposite point of view to the structured viewpoint, using as a starting point the belief that the primes exhibit strong pseudorandomness properties that are largely incompatible with the presence of rigid algebraic or geometric structure. We will discuss such heuristics later in this course.

It may be in the future that some usable structure to the primes (or related objects) will eventually be located (this is for instance one of the motivations in developing a rigorous theory of the “field with one element“, although this theory is far from being fully realised at present). For now, though, analytic and combinatorial methods have proven to be the most effective way forward, as they can often be used even in the near-complete absence of structure.

In this course, we will not discuss combinatorial approaches (such as the deployment of tools from additive combinatorics) in depth, but instead focus on the analytic methods. The basic principles of this approach can be summarised as follows:

- Rather than try to isolate individual primes in , one works with the set of primes in
*aggregate*, focusing in particular on*asymptotic statistics*of this set. For instance, rather than try to find a single pair of twin primes, one can focus instead on the*count*of twin primes up to some threshold . Similarly, one can focus on counts such as , , or , which are the natural counts associated to the other three Landau problems. In all four of Landau’s problems, the basic task is now to obtain a non-trivial lower bounds on these counts. - If one wishes to proceed analytically rather than combinatorially, one should convert all these counts into sums, using the fundamental identity
(or variants thereof) for the cardinality of subsets of the natural numbers , where is the indicator function of (and ranges over ). Thus we are now interested in estimating (and particularly in lower bounding) sums such as

or

- Once one expresses number-theoretic problems in this fashion, we are naturally led to the more general question of how to accurately estimate (or, less ambitiously, to lower bound or upper bound) sums such as
or more generally bilinear or multilinear sums such as

or

for various functions of arithmetic interest. (Importantly, one should also generalise to include integrals as well as sums, particularly contour integrals or integrals over the unit circle or real line, but we postpone discussion of these generalisations to later in the course.) Indeed, a huge portion of modern analytic number theory is devoted to precisely this sort of question. In many cases, we can predict an

*expected main term*for such sums, and then the task is to control the*error term*between the true sum and its expected main term. It is often convenient to normalise the expected main term to be zero or negligible (e.g. by subtracting a suitable constant from ), so that one is now trying to show that a sum of signed real numbers (or perhaps complex numbers) is small. In other words, the question becomes one of rigorously establishing a significant amount of*cancellation*in one’s sums (also referred to as a*gain*or*savings*over a benchmark “trivial bound”). Or to phrase it negatively, the task is to rigorously prevent a*conspiracy*of non-cancellation, caused for instance by two factors in the summand exhibiting an unexpectedly large correlation with each other. - It is often difficult to discern cancellation (or to prevent conspiracy) directly for a given sum (such as ) of interest. However, analytic number theory has developed a large number of techniques to relate one sum to another, and then the strategy is to keep transforming the sum into more and more analytically tractable expressions, until one arrives at a sum for which cancellation can be directly exhibited. (Note though that there is often a short-term tradeoff between analytic tractability and algebraic simplicity; in a typical analytic number theory argument, the sums will get expanded and decomposed into many quite messy-looking sub-sums, until at some point one applies some crude estimation to replace these messy sub-sums by tractable ones again.) There are many transformations available, ranging such basic tools as the triangle inequality, pointwise domination, or the Cauchy-Schwarz inequality to key identities such as multiplicative number theory identities (such as the Vaughan identity and the Heath-Brown identity), Fourier-analytic identities (e.g. Fourier inversion, Poisson summation, or more advanced trace formulae), or complex analytic identities (e.g. the residue theorem, Perron’s formula, or Jensen’s formula). The sheer range of transformations available can be intimidating at first; there is no shortage of transformations and identities in this subject, and if one applies them randomly then one will typically just transform a difficult sum into an even more difficult and intractable expression. However, one can make progress if one is guided by the strategy of isolating and enhancing a desired cancellation (or conspiracy) to the point where it can be easily established (or dispelled), or alternatively to reach the point where no deep cancellation is needed for the application at hand (or equivalently, that no deep conspiracy can disrupt the application).
- One particularly powerful technique (albeit one which, ironically, can be highly “ineffective” in a certain technical sense to be discussed later) is to use one potential conspiracy to defeat another, a technique I refer to as the “dueling conspiracies” method. This technique may be unable to prevent a single strong conspiracy, but it can sometimes be used to prevent
*two or more*such conspiracies from occurring, which is particularly useful if conspiracies come in pairs (e.g. through complex conjugation symmetry, or a functional equation). A related (but more “effective”) strategy is to try to “disperse” a single conspiracy into several distinct conspiracies, which can then be used to defeat each other.

As stated before, the above strategy has not been able to establish any of the four Landau problems as stated. However, they can come close to such problems (and we now have some understanding as to why these problems remain out of reach of current methods). For instance, by using these techniques (and a lot of additional effort) one can obtain the following sample partial results in the Landau problems:

- Chen’s theorem: every sufficiently large even number is expressible as the sum of a prime and an almost prime (the product of at most two primes). The proof proceeds by finding a nontrivial lower bound on , where is the set of almost primes.
- Zhang’s theorem: There exist infinitely many pairs of consecutive primes with . The proof proceeds by giving a non-negative lower bound on the quantity for large and certain distinct integers between and . (The bound has since been lowered to .)
- The Baker-Harman-Pintz theorem: for sufficiently large , there is a prime between and . Proven by finding a nontrivial lower bound on .
- The Friedlander-Iwaniec theorem: There are infinitely many primes of the form . Proven by finding a nontrivial lower bound on .

We will discuss (simpler versions of) several of these results in this course.

Of course, for the above general strategy to have any chance of succeeding, one must at some point use *some* information about the set of primes. As stated previously, usefully structured parametric descriptions of do not appear to be available. However, we do have two other fundamental and useful ways to describe :

- (Sieve theory description) The primes consist of those numbers greater than one, that are not divisible by any smaller prime.
- (Multiplicative number theory description) The primes are the multiplicative generators of the natural numbers : every natural number is uniquely factorisable (up to permutation) into the product of primes (the fundamental theorem of arithmetic).

The sieve-theoretic description and its variants lead one to a good understanding of the *almost primes*, which turn out to be excellent tools for controlling the primes themselves, although there are known limitations as to how much information on the primes one can extract from sieve-theoretic methods alone, which we will discuss later in this course. The multiplicative number theory methods lead one (after some complex or Fourier analysis) to the Riemann zeta function (and other L-functions, particularly the Dirichlet L-functions), with the distribution of zeroes (and poles) of these functions playing a particularly decisive role in the multiplicative methods.

Many of our strongest results in analytic prime number theory are ultimately obtained by incorporating some combination of the above two fundamental descriptions of (or variants thereof) into the general strategy described above. In contrast, more advanced descriptions of , such as those coming from the various primality tests available, have (until now, at least) been surprisingly ineffective in practice for attacking problems such as Landau’s problems. One reason for this is that such tests generally involve operations such as exponentiation or the factorial function , which grow too quickly to be amenable to the analytic techniques discussed above.

To give a simple illustration of these two basic approaches to the primes, let us first give two variants of the usual proof of Euclid’s theorem:

Theorem 1 (Euclid’s theorem)There are infinitely many primes.

*Proof:* (Multiplicative number theory proof) Suppose for contradiction that there were only finitely many primes . Then, by the fundamental theorem of arithmetic, every natural number is expressible as the product of the primes . But the natural number is larger than one, but not divisible by any of the primes , a contradiction.

(Sieve-theoretic proof) Suppose for contradiction that there were only finitely many primes . Then, by the Chinese remainder theorem, the set of natural numbers that is not divisible by any of the has density , that is to say

In particular, has positive density and thus contains an element larger than . But the least such element is one further prime in addition to , a contradiction.

Remark 1One can also phrase the proof of Euclid’s theorem in a fashion that largely avoids the use of contradiction; see this previous blog post for more discussion.

Both proofs in fact extend to give a stronger result:

*Proof:* (Multiplicative number theory proof) By the fundamental theorem of arithmetic, every natural number is expressible uniquely as the product of primes in increasing order. In particular, we have the identity

(both sides make sense in as everything is unsigned). Since the left-hand side is divergent, the right-hand side is as well. But

and , so must be divergent.

(Sieve-theoretic proof) Suppose for contradiction that the sum is convergent. For each natural number , let be the set of natural numbers not divisible by the first primes , and let be the set of numbers not divisible by any prime in . As in the previous proof, each has density . Also, since contains at most multiples of , we have from the union bound that

Since is assumed to be convergent, we conclude that the density of converges to the density of ; thus has density , which is non-zero by the hypothesis that converges. On the other hand, since the primes are the only numbers greater than one not divisible by smaller primes, is just , which has density zero, giving the desired contradiction.

Remark 2We have seen how easy it is to prove Euler’s theorem by analytic methods. In contrast, there does not seem to be any known proof of this theorem that proceeds by using any sort of prime-generating formula or a primality test, which is further evidence that such tools are not the most effective way to make progress on problems such as Landau’s problems. (But the weaker theorem of Euclid, Theorem 1, can sometimes be proven by such devices.)

The two proofs of Theorem 2 given above are essentially the same proof, as is hinted at by the geometric series identity

One can also see the Riemann zeta function begin to make an appearance in both proofs. Once one goes beyond Euler’s theorem, though, the sieve-theoretic and multiplicative methods begin to diverge significantly. On one hand, sieve theory can still handle to some extent sets such as twin primes, despite the lack of multiplicative structure (one simply has to sieve out two residue classes per prime, rather than one); on the other, multiplicative number theory can attain results such as the prime number theorem for which purely sieve theoretic techniques have not been able to establish. The deepest results in analytic number theory will typically require a combination of both sieve-theoretic methods and multiplicative methods in conjunction with the many transforms discussed earlier (and, in many cases, additional inputs from other fields of mathematics such as arithmetic geometry, ergodic theory, or additive combinatorics).

Things are pretty quiet here during the holiday season, but one small thing I have been working on recently is a set of notes on special relativity that I will be working through in a few weeks with some bright high school students here at our local math circle. I have only two hours to spend with this group, and it is unlikely that we will reach the end of the notes (in which I derive the famous mass-energy equivalence relation E=mc^2, largely following Einstein’s original derivation as discussed in this previous blog post); instead we will probably spend a fair chunk of time on related topics which do not actually require special relativity *per se*, such as spacetime diagrams, the Doppler shift effect, and an analysis of my airport puzzle. This will be my first time doing something of this sort (in which I will be spending as much time interacting directly with the students as I would lecturing); I’m not sure exactly how it will play out, being a little outside of my usual comfort zone of undergraduate and graduate teaching, but am looking forward to finding out how it goes. (In particular, it may end up that the discussion deviates somewhat from my prepared notes.)

The material covered in my notes is certainly not new, but I ultimately decided that it was worth putting up here in case some readers here had any corrections or other feedback to contribute (which, as always, would be greatly appreciated).

*[Dec 24 and then Jan 21: notes updated, in response to comments.]*

I recently finished the first draft of the the first of my books, entitled “Hilbert’s fifth problem and related topics“, based on the lecture notes for my graduate course of the same name. The PDF of this draft is available here. As always, comments and corrections are welcome.

This is an addendum to last quarter’s course notes on Hilbert’s fifth problem, which I am in the process of reviewing in order to transcribe them into a book (as was done similarly for several other sets of lecture notes on this blog). When reviewing the zeroth set of notes in particular, I found that I had made a claim (Proposition 11 from those notes) which asserted, roughly speaking, that any sufficiently large nilprogression was an approximate group, and promised to prove it later in the course when we had developed the ability to calculate efficiently in nilpotent groups. As it turned out, I managed finish the course without the need to develop these calculations, and so the proposition remained unproven. In order to rectify this, I will use this post to lay out some of the basic algebra of nilpotent groups, and use it to prove the above proposition, which turns out to be a bit tricky. (In my paper with Breuillard and Green, we avoid the need for this proposition by restricting attention to a special type of nilprogression, which we call a nilprogression in -normal form, for which the computations are simpler.)

There are several ways to think about nilpotent groups; for instance one can use the model example of the Heisenberg group

over an arbitrary ring (which need not be commutative), or more generally any matrix group consisting of unipotent upper triangular matrices, and view a general nilpotent group as being an abstract generalisation of such concrete groups. (In the case of nilpotent Lie groups, at least, this is quite an accurate intuition, thanks to Engel’s theorem.) Or, one can adopt a Lie-theoretic viewpoint and try to think of nilpotent groups as somehow arising from nilpotent Lie algebras; this intuition is rigorous when working with nilpotent Lie groups (at least when the characteristic is large, in order to avoid issues coming from the denominators in the Baker-Campbell-Hausdorff formula), but also retains some conceptual value in the non-Lie setting. In particular, nilpotent groups (particularly finitely generated ones) can be viewed in some sense as “nilpotent Lie groups over “, even though Lie theory does not quite work perfectly when the underlying scalars merely form an integral domain instead of a field.

Another point of view, which arises naturally both in analysis and in algebraic geometry, is to view nilpotent groups as modeling “infinitesimal” perturbations of the identity, where the infinitesimals have a certain finite order. For instance, given a (not necessarily commutative) ring without identity (representing all the “small” elements of some larger ring or algebra), we can form the powers for , defined as the ring generated by -fold products of elements in ; this is an ideal of which represents the elements which are “ order” in some sense. If one then formally adjoins an identity onto the ring , then for any , the multiplicative group is a nilpotent group of step at most . For instance, if is the ring of strictly upper matrices (over some base ring), then vanishes and becomes the group of unipotent upper triangular matrices over the same ring, thus recovering the previous matrix-based example. In analysis applications, might be a ring of operators which are somehow of “order” or for some small parameter or , and one wishes to perform Taylor expansions up to order or , thus discarding (i.e. quotienting out) all errors in .

From a dynamical or group-theoretic perspective, one can also view nilpotent groups as towers of central extensions of a trivial group. Finitely generated nilpotent groups can also be profitably viewed as a special type of polycylic group; this is the perspective taken in this previous blog post. Last, but not least, one can view nilpotent groups from a combinatorial group theory perspective, as being words from some set of generators of various “degrees” subject to some commutation relations, with commutators of two low-degree generators being expressed in terms of higher degree objects, and all commutators of a sufficiently high degree vanishing. In particular, generators of a given degree can be moved freely around a word, as long as one is willing to generate commutator errors of higher degree.

With this last perspective, in particular, one can start computing in nilpotent groups by adopting the philosophy that the lowest order terms should be attended to first, without much initial concern for the higher order errors generated in the process of organising the lower order terms. Only after the lower order terms are in place should attention then turn to higher order terms, working successively up the hierarchy of degrees until all terms are dealt with. This turns out to be a relatively straightforward philosophy to implement in many cases (particularly if one is not interested in explicit expressions and constants, being content instead with qualitative expansions of controlled complexity), but the arguments are necessarily recursive in nature and as such can become a bit messy, and require a fair amount of notation to express precisely. So, unfortunately, the arguments here will be somewhat cumbersome and notation-heavy, even if the underlying methods of proof are relatively simple.

In the last three notes, we discussed the Bourgain-Gamburd expansion machine and two of its three ingredients, namely quasirandomness and product theorems, leaving only the non-concentration ingredient to discuss. We can summarise the results of the last three notes, in the case of fields of prime order, as the following theorem.

Theorem 1 (Non-concentration implies expansion in )Let be a prime, let , and let be a symmetric set of elements in of cardinality not containing the identity. Write , and suppose that one has the non-concentration propertyfor some and some even integer . Then is a two-sided -expander for some depending only on .

*Proof:* From (1) we see that is not supported in any proper subgroup of , which implies that generates . The claim now follows from the Bourgain-Gamburd expansion machine (Theorem 2 of Notes 4), the product theorem (Theorem 1 of Notes 5), and quasirandomness (Exercise 8 of Notes 3).

Remark 1The same argument also works if we replace by the field of order for some bounded . However, there is a difficulty in the regime when is unbounded, because the quasirandomness property becomes too weak for the Bourgain-Gamburd expansion machine to be directly applicable. On theother hand, the above type of theorem was generalised to the setting of cyclic groups with square-free by Varju, to arbitrary by Bourgain and Varju, and to more general algebraic groups than and square-free by Salehi Golsefidy and Varju. It may be that some modification of the proof techniques in these papers may also be able to handle the field case with unbounded .

It thus remains to construct tools that can establish the non-concentration property (1). The situation is particularly simple in , as we have a good understanding of the subgroups of that group. Indeed, from Theorem 14 from Notes 5, we obtain the following corollary to Theorem 1:

Corollary 2 (Non-concentration implies expansion in )Let be a prime, and let be a symmetric set of elements in of cardinality not containing the identity. Write , and suppose that one has the non-concentration propertyfor some and some even integer , where ranges over all Borel subgroups of . Then, if is sufficiently large depending on , is a two-sided -expander for some depending only on .

It turns out (2) can be verified in many cases by exploiting the solvable nature of the Borel subgroups . We give two examples of this in these notes. The first result, due to Bourgain and Gamburd (with earlier partial results by Gamburd and by Shalom) generalises Selberg’s expander construction to the case when generates a thin subgroup of :

Theorem 3 (Expansion in thin subgroups)Let be a symmetric subset of not containing the identity, and suppose that the group generated by is not virtually solvable. Then as ranges over all sufficiently large primes, the Cayley graphs form a two-sided expander family, where is the usual projection.

Remark 2One corollary of Theorem 3 (or of the non-concentration estimate (3) below) is that generates for all sufficiently large , if is not virtually solvable. This is a special case of a much more general result, known as the strong approximation theorem, although this is certainly not the most direct way to prove such a theorem. Conversely, the strong approximation property is used in generalisations of this result to higher rank groups than .

Exercise 1In the converse direction, if is virtually solvable, show that for sufficiently large , fails to generate . (Hint:use Theorem 14 from Notes 5 to prevent from having bounded index solvable subgroups.)

Exercise 2 (Lubotzsky’s 1-2-3 problem)Let .

- (i) Show that generates a free subgroup of . (
Hint:use a ping-pong argument, as in Exercise 23 of Notes 2.)- (ii) Show that if are two distinct elements of the sector , then there os no element for which . (
Hint:this is another ping-pong argument.) Conclude that has infinite index in . (Contrast this with the situation in which the coefficients in are replaced by or , in which case is either all of , or a finite index subgroup, as demonstrated in Exercise 23 of Notes 2).- (iii) Show that for sufficiently large primes form a two-sided expander family.

Remark 3Theorem 3 has been generalised to arbitrary linear groups, and with replaced by for square-free ; see this paper of Salehi Golsefidy and Varju. In this more general setting, the condition of virtual solvability must be replaced by the condition that the connected component of the Zariski closure of is perfect. An effective version of Theorem 3 (with completely explicit constants) was recently obtained by Kowalski.

The second example concerns Cayley graphs constructed using random elements of .

Theorem 4 (Random generators expand)Let be a prime, and let be two elements of chosen uniformly at random. Then with probability , is a two-sided -expander for some absolute constant .

Remark 4As with Theorem 3, Theorem 4 has also been extended to a number of other groups, such as the Suzuki groups (in this paper of Breuillard, Green, and Tao), and more generally to finite simple groups of Lie type of bounded rank (in forthcoming work of Breuillard, Green, Guralnick, and Tao). There are a number of other constructions of expanding Cayley graphs in such groups (and in other interesting groups, such as the alternating groups) beyond those discussed in these notes; see this recent survey of Lubotzky for further discussion. It has been conjectured by Lubotzky and Weiss thatanypair of (say) that generates the group, is a two-sided -expander for an absolute constant : in the case of , this has been established for a density one set of primes by Breuillard and Gamburd.

** — 1. Expansion in thin subgroups — **

We now prove Theorem 3. The first observation is that the expansion property is monotone in the group :

Exercise 3Let be symmetric subsets of not containing the identity, such that . Suppose that is a two-sided expander family for sufficiently large primes . Show that is also a two-sided expander family.

As a consequence, Theorem 3 follows from the following two statments:

Theorem 5 (Tits alternative)Let be a group. Then exactly one of the following statements holds:

- (i) is virtually solvable.
- (ii) contains a copy of the free group of two generators as a subgroup.

Theorem 6 (Expansion in free groups)Let be generators of a free subgroup of . Then as ranges over all sufficiently large primes, the Cayley graphs form a two-sided expander family.

Theorem 5 is a special case of the famous Tits alternative, which among other things allows one to replace by for any and any field of characteristic zero (and fields of positive characteristic are also allowed, if one adds the requirement that be finitely generated). We will not prove the full Tits alternative here, but instead just give an *ad hoc* proof of the special case in Theorem 5 in the following exercise.

Exercise 4Given any matrix , the singular values are and , and we can apply the singular value decomposition to decomposewhere and are orthonormal bases. (When , these bases are uniquely determined up to phase rotation.) We let be the projection of to the projective complex plane, and similarly define .

Let be a subgroup of . Call a pair a

limit pointof if there exists a sequence with and .

- (i) Show that if is infinite, then there is at least one limit point.
- (ii) Show that if is a limit point, then so is .
- (iii) Show that if there are two limit points with , then there exist that generate a free group. (
Hint:Choose close to and close to , and consider the action of and on , and specifically on small neighbourhoods of , and set up a ping-pong type situation.)- (iv) Show that if is hyperbolic (i.e. it has an eigenvalue greater than 1), with eigenvectors , then the projectivisations of form a limit point. Similarly, if is regular parabolic (i.e. it has an eigenvalue at 1, but is not the identity) with eigenvector , show that is a limit point.
- (v) Show that if has no free subgroup of two generators, then all hyperbolic and regular parabolic elements of have a common eigenvector. Conclude that all such elements lie in a solvable subgroup of .
- (vi) Show that if an element is neither hyperbolic nor regular parabolic, and is not a multiple of the identity, then is conjugate to a rotation by (in particular, ).
- (vii) Establish Theorem 5. (
Hint:show that two square roots of in cannot multiply to another square root of .)

Now we prove Theorem 6. Let be a free subgroup of generated by two generators . Let be the probability measure generating a random walk on , thus is the corresponding generator on . By Corollary 2, it thus suffices to show that

for all sufficiently large , some absolute constant , and some even (depending on , of course), where ranges over Borel subgroups.

As is a homomorphism, one has and so it suffices to show that

To deal with the supremum here, we will use an argument of Bourgain and Gamburd, taking advantage of the fact that all Borel groups of obey a common group law, the point being that free groups such as obey such laws only very rarely. More precisely, we use the fact that the Borel groups are solvable of derived length two; in particular we have

for all . Now, is supported on matrices in whose coefficients have size (where we allow the implied constants to depend on the choice of generators ), and so is supported on matrices in whose coefficients also have size . If is less than a sufficiently small multiple of , these coefficients are then less than (say). As such, if lie in the support of and their projections obey the word law (4) in , then the original matrices obey the word law (4) in . (This lifting of identities from the characteristic setting of to the characteristic setting of is a simple example of the “Lefschetz principle”.)

To summarise, if we let be the set of all elements of that lie in the support of , then (4) holds for all . This severely limits the size of to only be of polynomial size, rather than exponential size:

Proposition 7Let be a subset of the support of (thus, consists of words in of length ) such that the law (4) holds for all . Then .

The proof of this proposition is laid out in the exercise below.

Exercise 5Let be a free group generated by two generators . Let be the set of all words of length at most in .

- (i) Show that if commute, then lie in the same cyclic group, thus for some and .
- (ii) Show that if , there are at most elements of that commute with .
- (iii) Show that if , there are at most elements of with .
- (iv) Prove Proposition 7.

Now we can conclude the proof of Theorem 3:

Exercise 6Let be a free group generated by two generators .

- (i) Show that for some absolute constant . (For much more precise information on , see this paper of Kesten.)
- (ii) Conclude the proof of Theorem 3.

** — 2. Random generators expand — **

We now prove Theorem 4. Let be the free group on two formal generators , and let be the generator of the random walk. For any word and any in a group , let be the element of formed by substituting for respectively in the word ; thus can be viewed as a map for any group . Observe that if is drawn randomly using the distribution , and , then is distributed according to the law , where . Applying Corollary 2, it suffices to show that whenever is a large prime and are chosen uniformly and independently at random from , that with probability , one has

for some absolute constant , where ranges over all Borel subgroups of and is drawn from the law for some even natural number .

Let denote the words in of length at most . We may use the law (4) to obtain good bound on the supremum in (5) assuming a certain non-degeneracy property of the word evaluations :

Exercise 7Let be a natural number, and suppose that is such that for . Show thatfor some absolute constant , where is drawn from the law . (

Hint:use (4) and the hypothesis to lift the problem up to , at which point one can use Proposition 7 and Exercise 6.)

In view of this exercise, it suffices to show that with probability , one has for all for some comparable to a small multiple of . As has elements, it thus suffices by the union bound to show that

for some absolute constant , and any of length less than for some sufficiently small absolute constant .

Let us now fix a non-identity word of length less than , and consider as a function from to for an arbitrary field . We can identify with the set . A routine induction then shows that the expression is then a polynomial in the eight variables of degree and coefficients which are integers of size . Let us then make the additional restriction to the case , in which case we can write and . Then is now a rational function of whose numerator is a polynomial of degree and coefficients of size , and the denominator is a monomial of of degree .

We then specialise this rational function to the field . It is conceivable that when one does so, the rational function collapses to the constant polynomial , thus for all with . (For instance, this would be the case if , by Lagrange’s theorem, if it were not for the fact that is far too large here.) But suppose that this rational function does not collapse to the constant rational function. Applying the Schwarz-Zippel lemma (Exercise 23 from Notes 5), we then see that the set of pairs with and is at most ; adding in the and cases, one still obtains a bound of , which is acceptable since and . Thus, the only remaining case to consider is when the rational function is identically on with .

Now we perform another “Lefschetz principle” maneuvre to change the underlying field. Recall that the denominator of rational function is monomial in , and the numerator has coefficients of size . If is less than for a sufficiently small , we conclude in particular (for large enough) that the coefficients all have magnitude less than . As such, the only way that this function can be identically on is if it is identically on for all with , and hence for or also by taking Zariski closures.

On the other hand, we know that for some choices of , e.g. , contains a copy of the free group on two generators (see e.g. Exercise 23 of Notes 2). As such, it is not possible for any non-identity word to be identically trivial on . Thus this case cannot actually occur, completing the proof of (6) and hence of Theorem 4.

Remark 5We see from the above argument that the existence of subgroups of an algebraic group with good “independence” properties – such as that of generating a free group – can be useful in studying the expansion properties of that algebraic group, even if the field of interest in the latter is distinct from that of the former. For more complicated algebraic groups than , in which laws such as (4) are not always available, it turns out to be useful to place further properties on the subgroup , for instance by requiring that all non-abelian subgroups of that group be Zariski dense (a property which has been calledstrong density), as this turns out to be useful for preventing random walks from concentrating in proper algebraic subgroups. See this paper of Breuillard, Guralnick, Green and Tao for constructions of strongly dense free subgroups of algebraic groups and further discussion.

In the previous set of notes, we saw that one could derive expansion of Cayley graphs from three ingredients: non-concentration, product theorems, and quasirandomness. Quasirandomness was discussed in Notes 3. In the current set of notes, we discuss product theorems. Roughly speaking, these theorems assert that in certain circumstances, a finite subset of a group either exhibits expansion (in the sense that , say, is significantly larger than ), or is somehow “close to” or “trapped” by a genuine group.

Theorem 1 (Product theorem in )Let , let be a finite field, and let be a finite subset of . Let be sufficiently small depending on . Then at least one of the following statements holds:

- (Expansion) One has .
- (Close to ) One has .
- (Trapping) is contained in a proper subgroup of .

We will prove this theorem (which was proven first in the cases for fields of prime order by Helfgott, and then for and general by Dinai, and finally to general and independently by Pyber-Szabo and by Breuillard-Green-Tao) later in this notes. A more qualitative version of this proposition was also previously obtained by Hrushovski. There are also generalisations of the product theorem of importance to number theory, in which the field is replaced by a cyclic ring (with not necessarily prime); this was achieved first for and square-free by Bourgain, Gamburd, and Sarnak, by Varju for general and square-free, and finally by this paper of Bourgain and Varju for arbitrary and .

Exercise 1 (Girth bound)Assuming Theorem 1, show that whenever is a symmetric set of generators of for some finite field and some , then any element of can be expressed as the product of elements from . (Equivalently, if we add the identity element to , then for some .) This is a special case of a conjecture of Babai and Seress, who conjectured that the bound should hold uniformly for all finite simple groups (in particular, the implied constants here should not actually depend on . The methods used to handle the case can handle other finite groups of Lie type of bounded rank, but at present we do not have bounds that are independent of the rank. On the other hand, a recent paper of Helfgott and Seress has almost resolved the conjecture for the permutation groups .

A key tool to establish product theorems is an argument which is sometimes referred to as the *pivot argument*. To illustrate this argument, let us first discuss a much simpler (and older) theorem, essentially due to Freiman, which has a much weaker conclusion but is valid in any group :

Theorem 2 (Baby product theorem)Let be a group, and let be a finite non-empty subset of . Then one of the following statements hold:

- (Expansion) One has .
- (Close to a subgroup) is contained in a left-coset of a group with .

To prove this theorem, we suppose that the first conclusion does not hold, thus . Our task is then to place inside the left-coset of a fairly small group .

To do this, we take a group element , and consider the intersection . *A priori*, the size of this set could range from anywhere from to . However, we can use the hypothesis to obtain an important dichotomy, reminiscent of the classical fact that two cosets of a subgroup of are either identical or disjoint:

Proposition 3 (Dichotomy)If , then exactly one of the following occurs:

- (Non-involved case) is empty.
- (Involved case) .

*Proof:* Suppose we are not in the pivot case, so that is non-empty. Let be an element of , then and both lie in . The sets and then both lie in . As these sets have cardinality and lie in , which has cardinality less than , we conclude from the inclusion-exclusion formula that

But the left-hand side is equal to , and the claim follows.

The above proposition provides a clear separation between two types of elements : the “non-involved” elements, which have nothing to do with (in the sense that , and the “involved” elements, which have a lot to do with (in the sense that . The key point is that there is a significant “gap” between the non-involved and involved elements; there are no elements that are only “slightly involved”, in that and intersect a little but not a lot. It is this gap that will allow us to upgrade approximate structure to exact structure. Namely,

Proposition 4The set of involved elements is a finite group, and is equal to .

*Proof:* It is clear that the identity element is involved, and that if is involved then so is (since . Now suppose that are both involved. Then and have cardinality greater than and are both subsets of , and so have non-empty intersection. In particular, is non-empty, and so is non-empty. By Proposition 3, this makes involved. It is then clear that is a group.

If , then is non-empty, and so from Proposition 3 is involved. Conversely, if is involved, then . Thus we have as claimed. In particular, is finite.

Now we can quickly wrap up the proof of Theorem 2. By construction, for all ,which by double counting shows that . As , we see that is contained in a right coset of ; setting , we conclude that is contained in a left coset of . is a conjugate of , and so . If , then and both lie in and have cardinality , so must overlap; and so . Thus , and so , and Theorem 2 follows.

Exercise 2Show that the constant in Theorem 2 cannot be replaced by any larger constant.

Exercise 3Let be a finite non-empty set such that . Show that . (Hint:If , show that for some .)

Exercise 4Let be a finite non-empty set such that . Show that there is a finite group with and a group element such that and .

Below the fold, we give further examples of the pivot argument in other group-like situations, including Theorem 2 and also the “sum-product theorem” of Bourgain-Katz-Tao and Bourgain-Glibichuk-Konyagin.

## Recent Comments